summaryrefslogtreecommitdiff
path: root/security/integrity
AgeCommit message (Expand)AuthorFilesLines
2016-05-04ima: fix the string representation of the LSM/IMA hook enumeration orderingMimi Zohar1-2/+2
2016-03-17Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds14-158/+409
2016-03-04Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris3-11/+9
2016-03-04X.509: Make algo identifiers text instead of enumDavid Howells2-4/+5
2016-03-04akcipher: Move the RSA DER encoding check to the crypto layerDavid Howells1-0/+1
2016-02-21ima: require signed IMA policyMimi Zohar1-0/+7
2016-02-21ima: measure and appraise the IMA policy itselfMimi Zohar4-3/+24
2016-02-21ima: load policy using pathDmitry Kasatkin1-2/+43
2016-02-21ima: support for kexec image and initramfsMimi Zohar3-7/+27
2016-02-21ima: remove firmware and module specific cached status infoMimi Zohar5-39/+28
2016-02-21module: replace copy_module_from_fd with kernel versionMimi Zohar1-22/+13
2016-02-21security: define kernel_read_file hookMimi Zohar1-0/+16
2016-02-21firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar1-11/+10
2016-02-21ima: define a new hook to measure and appraise a file already in memoryMimi Zohar6-14/+51
2016-02-19ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar1-2/+73
2016-02-19ima: provide buffer hash calculation functionDmitry Kasatkin2-0/+49
2016-02-19ima: use "ima_hooks" enum as function argumentMimi Zohar5-27/+37
2016-02-19ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar1-27/+36
2016-02-19ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin8-40/+33
2016-02-18integrity: convert digsig to akcipher apiTadeusz Struk2-7/+4
2016-02-12EVM: Use crypto_memneq() for digest comparisonsRyan Ware1-1/+2
2016-02-10KEYS: CONFIG_KEYS_DEBUG_PROC_KEYS is no longer an optionDavid Howells1-1/+0
2016-02-09IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King1-1/+1
2016-01-23wrappers for ->i_mutex accessAl Viro1-4/+4
2016-01-18Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds17-76/+575
2016-01-04fix the leak in integrity_read_file()Al Viro1-5/+6
2016-01-03ima: ima_write_policy() limit lockingPetko Manolov1-9/+9
2015-12-25IMA: policy can be updated zero timesSasha Levin3-0/+14
2015-12-15security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker1-3/+2
2015-12-15ima: update appraise flags after policy update completesMimi Zohar1-2/+5
2015-12-15IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar1-0/+2
2015-12-15IMA: allow reading back the current IMA policyPetko Manolov4-8/+253
2015-12-15IMA: create machine owner and blacklist keyringsPetko Manolov4-0/+87
2015-12-15IMA: policy can now be updated multiple timesPetko Manolov3-28/+75
2015-12-15evm: EVM_LOAD_X509 depends on EVMArnd Bergmann1-1/+1
2015-12-15evm: reset EVM status when file attributes changeDmitry Kasatkin1-0/+13
2015-12-15evm: provide a function to set the EVM key from the kernelDmitry Kasatkin2-14/+46
2015-12-15evm: enable EVM when X509 certificate is loadedDmitry Kasatkin4-3/+14
2015-12-15evm: load an x509 certificate from the kernelDmitry Kasatkin4-0/+33
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin7-22/+35
2015-11-07mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman1-1/+1
2015-10-21KEYS: Merge the type-specific data with the payload dataDavid Howells1-1/+1
2015-10-09integrity: prevent loading untrusted certificates on the IMA trusted keyringDmitry Kasatkin1-1/+1
2015-07-01Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-1/+1
2015-06-16ima: update builtin policiesMimi Zohar1-9/+56
2015-06-16ima: extend "mask" policy matching supportMimi Zohar1-5/+15
2015-06-16ima: add support for new "euid" policy conditionMimi Zohar1-4/+23
2015-06-16ima: fix ima_show_template_data_ascii()Mimi Zohar3-4/+5
2015-05-28kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez1-1/+1
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu5-9/+13